Discount Offer
Go Back on 220-1102 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

220-1102 Practice Test

Whether you're a beginner or brushing up on skills, our 220-1102 practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 19 out of 148 Pages

Topic 1: Exam Pool A

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?


A. Pretexting


B. Spoofing


C. Vishing


D. Scareware





C.
  Vishing

Explanation:
Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such as a bank or financial institution, in order to gain access to sensitive information. The caller will typically use a variety of techniques, such as trying to scare the target or providing false information, in order to get the target to provide the information they are after. Vishing is often used to gain access to usernames, passwords, bank account information, and other sensitive data.

Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in the trash bin? .exe


A. .dmg


B. . app


C. . rpm


D. .pkg





C.
  . rpm

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?


A. Encryption at rest


B. Account lockout


C. Automatic screen lock


D. Antivirus





B.
  Account lockout

Explanation:
Account lockout would best mitigate the threat of a dictionary attack1

Which of the following protocols supports fast roaming between networks?


A. WEP


B. WPA


C. WPA2


D. LEAP


E. PEAP





C.
  WPA2

Explanation: WPA2 is the only protocol among the options that supports fast roaming between networks. Fast roaming, also known as IEEE 802.11r or Fast BSS Transition (FT), enables a client device to roam quickly in environments implementing WPA2 Enterprise security, by ensuring that the client device does not need to re-authenticate to the RADIUS server every time it roams from one access point to another1. WEP, WPA, LEAP, and PEAP do not support fast roaming and require the client device to perform the full authentication process every time it roams, which can cause delays and interruptions in the network service.

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published? Standard operating procedure


A. Acceptable use policy


B. Security protocols


C. Data flow diagram





B.
  Security protocols


Page 19 out of 148 Pages
Previous